9
9.0
audio
eye 9
favorite 0
comment 0
The audio here is made up of binaural microphone recordings made within the middle of a multichannel ring of 8 speakers. We swapped between cutting up and manipulating field recorded audio, while the other wore the microphone on the clothes. This allowed for the ‘recorder’ to move around the circle favouring certain speakers, thus you get an even more extreme panning. As well as this, individual chunks of the field recording are spread across the 8 channels, swapping and changing at random....
Topic: Algorithm
Canada's own Tori and James (phlux) Brine, producing great sounding electronic music for the masses! We started this project in the late 1998. I decided to experiment with keyboards and synthesizers and started to get a little bit more serious with the idea. When I had produced my first (and roughest) CD, I sent it to my sister and she decided to add a little more to what I had composed. Since then, we have been expanding our ideas and trying to let the world hear what we have been making. I...
Topic: Algorithm
8
8.0
Feb 13, 2019
02/19
by
Sven Köpke
movies
eye 8
favorite 0
comment 0
A simulation of the genetic multi-objective optimzation problem solver NSGA-II for the Portfolio Optimization Problem under robustness type I
Topics: Algorithm, Genetic Algorithm, NSGA-II
27
27
Mar 26, 2014
03/14
by
Laverna J. Thurston
data
eye 27
favorite 0
comment 0
Redundancy in Public-Private Key Pairs Laverna J. Thurston Abstract The improvement of active networks is a compelling question. In this paper, we prove the emulation of journaling file systems. Our focus in this work is not on whether the much-touted lossless algorithm for the refinement of forward-error correction by Harris [ 13 ] is recursively enumerable, but rather on introducing an interposable tool for enabling cache coherence (Tarpon).
Topic: algorithm
7
7.0
Feb 13, 2019
02/19
by
Sven Köpke
movies
eye 7
favorite 0
comment 0
A simulation of the genetic multi-objective optimzation problem solver NSGA-II for the Portfolio Optimization Problem under robustness type II
Topics: Algorithm, Genetic Algorithm, NSGA-II
102
102
Apr 2, 2014
04/14
by
RUTUJA R. PATIL & P. R. DEVALE
texts
eye 102
favorite 0
comment 0
These days, Signature based Network Intrusion Detection Systems (NIDS), which apply a set of rules to identify hostile traffic in network segments are quickly updated in order to prevent systems against new attacks. The objective of an attacker is to find out new evasion techniques to stay unseen. Unfortunately, majority of the existing techniques are based on the ambiguities of the network protocols. As a result of the emergence of the new evasion techniques, NIDS system may fail to give the...
Topics: NIDS, Evasion, Apriori Algorithm, AdaBoost Algorithm, Snort
340
340
image
eye 340
favorite 0
comment 0
Melodies based on MIDImage 3 Demo Manipulated in Cubase Elements 7 Composed by Ludwig 3 (Chess algorithms) Mastered in Wavelab Elements 7 by using Reaktor 5.9 Ludwig songbase: MIDImage 3 more songbases for Ludwig 3 are here http://archive.org/details/Ludwig3-Addons
Topic: algorithm composing
22
22
Jul 25, 2017
07/17
by
Bjarne Stroustrop
texts
eye 22
favorite 0
comment 0
Bell Labs memo
Topics: stack, algorithm
29
29
Jul 14, 2018
07/18
by
Ali Baba
texts
eye 29
favorite 0
comment 0
Algorithms for programmers
Topics: Algorithm, programming
39
39
Jul 25, 2017
07/17
by
M. Douglas McIlroy
texts
eye 39
favorite 0
comment 0
Bell Labs tech report
Topics: ellipse, algorithm
1
1.0
Sep 16, 2018
09/18
by
Shubham Singh
texts
eye 1
favorite 0
comment 0
Facility location Problem
Topic: Approximation Algorithm
These days, Signature based Network Intrusion Detection Systems (NIDS), which apply a set of rules to identify hostile traffic in network segments are quickly updated in order to prevent systems against new attacks. The objective of an attacker is to find out new evasion techniques to stay unseen. Unfortunately, majority of the existing techniques are based on the ambiguities of the network protocols. As a result of the emergence of the new evasion techniques, NIDS system may fail to give the...
Topics: NIDS, Evasion, Apriori Algorithm, Adaboost Algorithm, Snort
14
14
Jul 25, 2017
07/17
by
Eric Grosse
texts
eye 14
favorite 0
comment 0
Bell Labs memo
Topics: pipeline, algorithm
58
58
Sep 9, 2017
09/17
by
Avinash Ray
texts
eye 58
favorite 0
comment 0
In current scenario the entire world is moving towards digital communication for fast and better communication. But in this a problem rises with security i.e. when we have to store information (either data or image) at any casual location or transmit information through internet. As internet is an open transmission medium, security of data becomes very important. To defend our information from piracy or from hacking we use a technique and i.e. known as Encryption Technique. In this paper, we...
Topic: Genetic Algorithm
31
31
Jul 25, 2017
07/17
by
Brenda S. Baker
texts
eye 31
favorite 0
comment 0
Bell Labs report
Topics: duplication, algorithm
20
20
Jul 25, 2017
07/17
by
Poul-Henning Kamp
texts
eye 20
favorite 0
comment 0
Memory allocator implementation
Topics: malloc, algorithm
176
176
Dec 4, 2009
12/09
by
UCT Algorithm Circle
movies
eye 176
favorite 0
comment 0
Topics: Algorithm, Compilers
87
87
Jul 25, 2017
07/17
by
Webb Miller and Eugene W. Myers
texts
eye 87
favorite 0
comment 0
Software Practice and Experience
Topics: diff, algorithm
65
65
Nov 17, 2015
11/15
by
Florentin Smarandache
texts
eye 65
favorite 0
comment 0
This chapter further extends the results obtained in chapters 4 and 5 (from linear equation to linear systems). Each algorithm is thoroughly proved and then an example is given. Five integer number algorithms to solve linear systems are further given.
Topics: Algorithm, functions
This paper proposes an approach based on Bacterial Foraging Algorithm (BFA) for optimal placement of Distribution Generations (DGs). The optimal sitting and sizing of distributed generation is formulated as a multi-objective function including the network power losses minimization and voltage profile improvement. BFA algorithm has been employed to optimize the problem. To demonstrate the effectiveness of the proposed approach, it has been applied to 33 and 69 bus systems. The results of the...
Topics: Distributed Generation, Optimal Placement, Bacterial Foraging Algorithm (BFA), Genetic Algorithm...
562
562
Apr 16, 2008
04/08
by
Martin Pelikan, David E. Goldberg, Erick Cantu-Paz
texts
eye 562
favorite 0
comment 0
Martin Pelikan, David E. Goldberg, & Erick Cantú-Paz, E. (1999). BOA: The Bayesian optimization algorithm. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-99), I, 525-532. Also IlliGAL Report No. 99003. Abstract In this paper, an algorithm based on the concepts of genetic algorithms that uses an estimation of a probability distribution of promising solutions in order to generate new candidate solutions is proposed. To estimate the distribution, techniques for...
Topics: Bayesian optimization algorithm, BOA, estimation of distribution algorithm, EDA, genetic algorithm,...
803
803
texts
eye 803
favorite 0
comment 0
Improving Utilization of Infrastructure Cloud A key advantage of Infrastructure-as-a-Service (IaaS) cloud is providing users on-demand access to resources. However, to provide on-demand access, cloud providers must either significantly overprovision their infrastructure (or pay a high price for operating resources with low utilization) or reject a large proportion of user requests (in which case the access is no longer on-demand). At the same time, not all users require truly on-demand access...
Topics: MFCC algorithm, Search Engine, Ranking algorithm, Information Retrieval
The method in which the visual information is encrypted by the process of encryption and those encrypted images are decrypted via sight reading is said to be called as visual cryptography or it is a method to hide the picture or an image into non-identical number of shares (different shares) and they are distributed to different set of participants. There are two sets of participants namely qualified and unqualified. The qualified set will combine with the participants of non-qualified set in...
Topics: GAS Algorithm, Stamping Algorithm, Pixel Expansion, Shares., Information Technology
105
105
Dec 5, 2009
12/09
by
UCT Algorithm Circle
movies
eye 105
favorite 0
comment 0
Topics: Algorithm, Graphs, DFS
95
95
Sep 17, 2013
09/13
by
Bilal
texts
eye 95
favorite 0
comment 0
DS&A
Topic: Data Structure And Algorithm
2,805
2.8K
Oct 20, 2008
10/08
by
hassan abdulaziz
texts
eye 2,805
favorite 0
comment 0
this book provide a clear vision on the analysis of algorithm and design it.
Topics: analysis, algorithm, IS
30
30
Jul 25, 2017
07/17
by
John D. Hobby
texts
eye 30
favorite 0
comment 0
Research paper
Topics: fonts, outline, algorithm
1,062
1.1K
Dec 5, 2009
12/09
by
UCT Algorithm Circle
movies
eye 1,062
favorite 0
comment 0
Topics: Algorithm, BFS, Dijkstra
Multicast services are increased in exponential manner in these last few years and in particular in the field of multimedia services. Multicast can reduce resources allocation and enhance network performances in terms of QoS, especially in a wireless platforms where the bandwidth is a precious resource. The problem of multicast routing can be reduced to the problem of finding a spanning tree capable to distribute network flow among multicast sources and destinations. It has been established...
Topics: Scalable Algorithm, Multicast routing, heterogeneous platforms, Genetic Algorithm, Simulated...
The method in which the visual information is encrypted by the process of encryption and those encrypted images are decrypted via sight reading is said to be called as visual cryptography or it is a method to hide the picture or an image into non-identical number of shares (different shares) and they are distributed to different set of participants. There are two sets of participants namely qualified and unqualified. The qualified set will combine with the participants of non-qualified set in...
Topics: GAS Algorithm, Stamping Algorithm, Pixel Expansion, Shares., Information Technology
240
240
Sep 26, 2012
09/12
by
Guang Dong, Wei He, Ming Fang, Guangcai Cui
texts
eye 240
favorite 0
comment 0
This paper designs a hybrid genetic algorithm for job-shop scheduling combined with a Genetic Algorithm (GA), Simulated Annealing (SA), and a Tabu Search (TS) algorithm. It gives a method for initial population generation for avoiding unreasonable solutions, and introduces SA and TS into the genetic operation mechanism of GA for overcoming the lack of job-shop scheduling optimization. Simulated computations show the superiority of the hybrid genetic algorithm, and examples verify the...
Topics: Job-shop Scheduling, Genetic Algorithm, Simulated Annealing Algorithm, Tabu Search
Naval Postgraduate School
171
171
Dec 7, 2012
12/12
by
Gragg, William B.;Ammar, Gregory S.
texts
eye 171
favorite 0
comment 0
Title from cover
Topics: EXPERIMENTAL DATA., ALGORITHM.
69
69
May 28, 2017
05/17
by
ICGST LLC
texts
eye 69
favorite 0
comment 0
Abstract: word segmentation is the process of finding the best likely sequence of words from a sequence of concatenated characters without spaces. Several researches proposed solutions to word segmentation using heuristic methods. The main task of the last methods is to hopefully find the best segmentation without searching the entire state spaces. This paper proposes a new approach for word segmentation based on parameters optimization by means of Genetic Algorithm. The approach is tested on...
Topics: Word segmentation, Genetic Algorithm
125
125
Nov 2, 2015
11/15
by
Octavian Cira, Florentin Smarandache
texts
eye 125
favorite 0
comment 0
The first prime number with the special property that its addition with its reversal gives as result a prime number too is 299. The prime numbers with this property will be called Luhn prime numbers. In this article we intend to present a performing algorithm for determining the Luhn prime numbers.
Topics: Luhn prime numbers, algorithm
34
34
Jun 21, 2016
06/16
by
Ruiqi Guo, Qieyun Dai and Derek Hoiem
texts
eye 34
favorite 0
comment 0
Single-Image Shadow Detection and Removal using Paired Regions Ruiqi Guo, Qieyun Dai and Derek Hoiem CVPR 2011. Demo code for detecting and removing shadows.
Topics: shadow, algorithm, code, programming
50
50
Oct 9, 2015
10/15
by
Gragg, William B.;Ammar, Gregory S.
texts
eye 50
favorite 0
comment 0
Title from cover
Topic: EXPERIMENTAL DATA.,ALGORITHM.
380
380
texts
eye 380
favorite 1
comment 0
MIT Algorithmen
Topics: Math, Algorithm, Numbers
941
941
Jun 21, 2016
06/16
by
Ruiqi Guo, Qieyun Dai and Derek Hoiem
software
eye 941
favorite 0
comment 0
Single-Image Shadow Detection and Removal using Paired Regions Ruiqi Guo, Qieyun Dai and Derek Hoiem 10.1109/CVPR.2011.5995725 Demo code for detecting and removing shadows. This code is written in Matlab and is tested on MATLAB 2009b on Linux x86_64. Some supporting mex files may need to recompiled for other platforms. See the README file for instruction.
Topics: shadow, code, programming, algorithm
22
22
Mar 21, 2017
03/17
by
ICGST LLC
texts
eye 22
favorite 0
comment 0
Abstract: The process of assigning tasks to resources with the aim of optimizing some objective is known as scheduling. Many algorithms are used to schedule tasks on their resources. One of these algorithms is the MASA scheduling algorithm which depends on max-min scheduling algorithm. A drawback of the max-min scheduling algorithm is that; the execution of tasks with maximum execution time first, increases the makespan, and leads to a delay in executing tasks with minimum execution times. The...
Topics: Distributed system Scheduling, Scheduling algorithm, Max – min algorithm, Minimum Average...
Cloud is a new age technology used to connect to applications and data from anywhere round the globe via the internet. Anything and everything ranging from mobile phones to servers can be connected to the cloud. This has resulted into companies providing a large range of services to consumers. Upcoming businesses can now focus on its major purpose and not have to install their own servers. They can easily outsource it to these cloud providers saving them from a lot of capital investment. With...
Topics: Virtualization, Virtual Machine, K-Mean Clustering, Migration, Load Balancing Algorithm, Skewness...
40
40
Aug 22, 2016
08/16
by
ICGST LLC
texts
eye 40
favorite 0
comment 0
Abstract: Scheduling is the process of allocating tasks to resources in order to optimize some objective function. There have been many algorithms used to schedule tasks on their resources .One of these scheduling algorithms is the Enhanced Max-min task scheduling algorithm which selects a task with average execution time(average or nearest greater than average) and assigns it to a corresponding resource producing minimum completion time. A drawback of this algorithm is that when some average...
Topics: Scheduling, Max – min algorithm, Improved Max-Min Algorithm, Enhanced Max-min Task Scheduling...
22
22
texts
eye 22
favorite 0
comment 0
The scope of this work extends to system components (for example service providers, networks, servers, hosts, applications, processes and personnel) which are used to exchange PIN-related data. The PIN Guidelines in this document encompass PIN security within any one system or sub-system and between systems. This process designs 10 digit keypad with random RGB color SCHEME using a Fast Finite-State Algorithm for Generating RGB Palettes of Color. In this work, we propose a color finite-state LBG...
Topics: Palettes, Color quantization, LBG algorithm, finite-state algorithm
369
369
Apr 16, 2008
04/08
by
Martin Pelikan, David E. Goldberg
texts
eye 369
favorite 0
comment 0
Martin Pelikan, & David E. Goldberg (2000). Hierarchical Problem Solving by the Bayesian Optimization Algorithm. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-200), 267-274. Also IlliGAL Report No. 2000002. Abstract: The paper discusses three major issues. First, it discusses why it makes sense to approach problems in a hierarchical fashion. It defines the class of hierarchically decomposable functions that can be used to test the algorithms that approach...
Topics: hierarchical Bayesian optimization algorithm, hBOA, estimation of distribution algorithm, EDA
55
55
texts
eye 55
favorite 0
comment 0
Epidemic applications of power electronic based non-linear loads result in increase of harmonics in the power system. The current harmonics produced by these non-linear loads result in voltage distortion and leads to various power quality problems. So it is important to eliminate the harmonics in the power system. The harmonic elimination through Shunt Active Power filter (SAPF) provides higher efficiency and more pliable when compared with passive filters. This paper presents a standard...
Topics: Power Quality, SAPF, PI Control Algorithm, Fuzzy Control Algorithm.
Journal of Research of the National Bureau of Standards
Topics: Edmonds maximum matching algorithm, efficient algorithm, graph G
In the last few years, there has been explosive growth in the application of meta-heuristics algorithm for solving Sudoku puzzles in computer science. In this paper we present a hybrid genetic algorithm (HGA) that uses a “random” technology to improve the performance of genetic algorithm. We also show the performance of the algorithms for solving Sudoku puzzles with 46 different examples. The experimental results indicate that HGA is able to produce very competitive results with respect to...
Topics: Sudoku, Hybrid Genetic Algorithm, Metaheuristics Algorithm, Optimization, Random Search Strategy
5
5.0
Sep 24, 2018
09/18
by
Soundarya B A ; Sowmeya D ; Yazhini G V
texts
eye 5
favorite 0
comment 0
The method in which the visual information is encrypted by the process of encryption and those encrypted images are decrypted via sight reading is said to be called as visual cryptography or it is a method to hide the picture or an image into non-identical number of shares (different shares) and they are distributed to different set of participants. There are two sets of participants namely qualified and unqualified. The qualified set will combine with the participants of non-qualified set in...
Topics: GAS Algorithm, Stamping Algorithm, Pixel Expansion, Shares, Information Technology
Topics: warcarchives, russian, algorithm, language
128
128
audio
eye 128
favorite 0
comment 0
Algorithm, next permutation, leetcode
Topics: Algorithm, next permutation, leetcode
Wide Area Information Servers Project Documentation, Scanned and uploaded in 2013.
Topics: WAIS, Internet History, Algorithm